SlideShare a Scribd company logo
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 11, No. 1, February 2021, pp. 434~441
ISSN: 2088-8708, DOI: 10.11591/ijece.v11i1.pp434-441  434
Journal homepage: http://ijece.iaescore.com
Features of genetic algorithm for plain text encryption
Riyadh Bassil Abduljabbar, Oday Kamil Hamid, Nazar Jabbar Alhyani
Department of Computer Techniques Engineering, Dijlah University College, Iraq
Article Info ABSTRACT
Article history:
Received Apr 24, 2020
Revised Jun 15, 2020
Accepted Aug 5, 2020
The data communication has been growing in present day. Therefore,
the data encryption became very essential in secured data transmission and
storage and protecting data contents from intruder and unauthorized persons.
In this paper, a fast technique for text encryption depending on genetic
algorithm is presented. The encryption approach is achieved by the genetic
operators Crossover and mutation. The encryption proposal technique based
on dividing the plain text characters into pairs, and applying the crossover
operation between them, followed by the mutation operation to get
the encrypted text. The experimental results show that the proposal provides
an important improvement in encryption rate with comparatively high-speed
processing.
Keywords:
Crossover
Genetic algorithm
Mutation
Plain text
Text encryption This is an open access article under the CC BY-SA license.
Corresponding Author:
Riyadh Bassil Abduljabbar,
Department of Computer Engineering Techniques,
Dijlah University College,
Baghdad, Iraq.
Email: riyadh.bassil@duc.edu.iq
1. INTRODUCTION
Cryptography field has been attracted a lot of concern especially in network security. Internet
popularity and its usage increases due and to the exponential increase in the security needs for
the transactions ine-commerce field [1]. In addition to risks which involved regarding the communication of
raw data via the Internet. High and importance gain could be provided by data integrity, non-repudiation,
confidentiality, and authenticity which become more important component in the security of information
[2, 3]. The best solution for keeping safe data transfer is the use of cryptography as a technique
for encrypting and decrypting messages soany body can not interpret it, only the message sender and
the receiver can. Consequently, data encryption has become an inevitable and integral part of any application
in e-commerce [4-6]. Therefore, it is very important to encrypt data using a robust and fast encryption
algorithm in order to make sure of secret transmission and data delivery to protect it from any intruder.
In general, the concept of encryption techniques is converting the plain text to cipher text before storage or
transmission [7-10]. The Genetic algorithm properties (mutation, crossover and selection) have been
exploited by many researchers for data encryption optimizing and searching problems through generating
typical solutions [11, 12]. This paper introduces new method for data encryption based on the Genetic
algorithm operators (Crossover and mutation) with a varying crossover and mutation points of indexs
between character pairs.
The outline of this paper is ordered: Section 1 focoused on the work review. The suggested
technique is described in section 2. The experimental results and encryption analysis are highlight in
section 3. Finally, conclusion is showed in section 4. In Cryptography, many researches have been done to
enhance the genetic algorithm. Jhingran and Vikas [13] presented Studies on cryptography techniques using
Int J Elec & Comp Eng ISSN: 2088-8708 
Features of genetic algorithm for plain text encryption (Riyadh Bassil Abduljabbar)
435
genetic algorithm. In which, cryptography system is proposed by utilized thegenetic algorithm and
public key. In 2014, Sindhuja and Pramela [14, 15] introduced a symmetric key for message encryption
and decryption. The length of secret key is concerned with number point of both crossover and
mutation processing.
Srikanth and Noha proposed mutation and crossover operations of genetic algorithm with
pseudorandom function for data encryption [16]. To increase the robustness of the secret key, Nazeer and
Ghulamo, suggests genetic algorithm with random number generator to introduce a secret key. The raw
data is diffused by crossover and mutation. Finally, the diffused data and key are undergoing to logical
operations [17]. In 2019, Alsadig and Mandour [18] have proposed a text encryption using genetic algorithm.
The secret key is generated by exploit the crossover and mutation. Then, the permutation factor generated
randomly. Subsequently, the secret key and the permutation factor are applied to the plain text.
Shafiul and Sabir also proposed genetic algorithm combined with fitness function for text
encryption, in which the crossover and mutation operations are combined with a random function generator
for best key generation [19]. Afigha and Sofia [20] suggested security improvement to randomness of
security key unexpected based on crossover and mutation features of genetic algorithm. The results show that
the generated secret key is most randomness and unpredictable by the intruder.
In order to protect and secured data in cloud computing, Amitha and T.R suggested algorithm called
DSLA, in which a private key is used to investigate the user reliability [21]. The IOT (Internet of Thing) is
a device useful for communicate and exchange information between computerize schemes. Rubesh and
kirybanand presented a proposal to increase the security level between IOT and clients by integrate the public
key, asymmetric and symmetric cryptography system [22].
In 2020, Nedal.and Ashraf, introduced a combine chaotic map with RSA algorithm to improve
security level of RSA key. The results show that the security level of new approach is enhanced compared
with RAS public key standalone and reduced the computational processing time [23]. The main security of
WSN established on key distribution between nodes. Jyothi and Nagarai defines a new method for key
distribution within WSN based on ECC. The proposal reshuffling the ECC public key by utilized Arnold
map. The result show that the suggestion can be applied on poor recourse communication system [24].
Several ciphers have been developed to text encryption. Oday and nazar in 2019, described cipher algorithm
for text encryption. The encryption implements Pascal matrix and inverse Pascal matrix preformed for
decryption processing [25].
2. RESEARCH METHOD
The proposed algorithm is divided into two main processes, the encryption process and
the decryption process each onedepends on genetic operators to implement the encryption and
decryptionwith the aid of character pairs technique.
2.1. Encryption process
As shown in Figure 1, encryption process can be characterized starting from reading the plain text
message, converting the text characters into binary form after taking its equivalent Unicodevalues. The first
generation is produced when crossover operation is implemented between the binary pairs (crossover index
(1) is used for the first pair (1) for the second pair (3) for the third pair till (8) for the eighth pair and the cross
over is restarted to (1) for the nineth pair and so on. Mutation point is applied to the resulted generation
(mutation index (1) is used for the first pair (1) for the second pair (3) for the third pair till (8) for the eighth
pair and the cross over is restarted to (1) for the nineth pair and so on. Ciphered text is produced after getting
the equivalent characters according to ASCII table. The methodology of the encryption process is illustrated
in Figure 1.
2.2. Decryption process
The decryption method is shown in Figure 2, and described as follows, at the receiver part
the receiver will receive the encrypted text that consists of two parts the first part is (Parent1) and the second
part is (Parent2). Both (Parent1) and (Parent2) characters are converted to its equivalentuincodevaluesand
then to their equivalent binary form of byte length. Mutation operation is implemented on (Parent1) and
(Parent2)(mutation index (1) is used for the first pair (1) for the second pair (3) for the third pair till (8) for
the eighth pair and the cross over is restarted to (1) for the nineth pair and so onthe result is (Child1 &
Child2). Crossover operation is donebetweenthe (Child1) and (Child2)(crossover index (1) is used for
the first pair (1) for the second pair (3) for the third pair till (8) for the eighth pair and the cross over is
restarted to (1) for the nineth pair and so onto get theoriginalplain text. The methodology of the decryption
process is illustrated in Figure 2.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 1, February 2021 : 434 - 441
436
Figure 1. Flow chart of the encryption process
Figure 2. Flow chart of thedecryption process
3. RESULTS AND DISCUSSIONS
All the expermints have been preformed in MATLAB version 10 and achivied on Intel core i5
processor (2.4) GHz and RAM (8) GB.
3.1. Encrypting an English text message
The proposal encryption structure as shown in Figure 3 and defined as follows:
Int J Elec & Comp Eng ISSN: 2088-8708 
Features of genetic algorithm for plain text encryption (Riyadh Bassil Abduljabbar)
437
At first the English plain text message to be encrypted using the proposed technique is read by using
(text read) Matlab instruction. The plain textthatenterd to the program is "Very secret message" so the plain
text message contains (19) characters. The encryption process for the plain text message is illustrated in
the below steps:
1: Read the plain text message that is saved in a (.txt) file.
2: Calculate the length of the plain text (L=19)
3: Initialize character pair index (i=1)
4: Mutation point = 1; Crossoverpoint=1
5: If i=L then input (ChL& Ch1) Else input (Chi & Chi+1)
6: Gettheunicodefor each character.
7: Convert the unicodevaluesinto its equivalent binary form of (8-bit) length
8: Do single point Crossover operation of index (i) betweenthe pairs of indexs (i& i+1)
9: Mutate the result (Child1(i)) & (Child2(i)) using Mutation point index (i)
10: Get the (char) of the Mutation operation result
11: Ciphered character of index (i) is produced
12: Increment the variable (i) by one (i=i+1)
13: If (i>19) Then Ciphered text is completedElse (Crossover point= Crossoverpoint+1);
Mutation point = Mutation Point+1
14: If Crossover point& Mutation point> 8 Then (Crossoverpoint =1; Mutationpoint =1)
15: Check If i=19Then input the characters pair of indexes of (19&1) hence (Ch19, Ch1)
DoSteps (6-14) Else Do Steps (6-15)
The result is the encrypted text which is “dp}x3Q%ٍdvd%}G3‫ل‬fgR” is sent along with (Child2).
The result which is “Wgv!`G#‫م‬sg0huQ3ٍ`ea” after running the Matlab program are illustrated in
the Figure 3.
Figure 3. Program run results
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 1, February 2021 : 434 - 441
438
3.2. Decrypting an English text message
The decryption steps and the results are summarized in Figure 4, and demonstrated as follows:
At the receiver end the receiver will receive the encrypted text“dp}x3Q%ٍdvd%}G3‫ل‬fgr” which is
considered as (Parent1) along with “Wgv!`G#‫م‬sg0huQ3ٍ`eA”which is considered as (Parent2) this encrypted
text message is read by using (text read) Matlabinstruction. The encryption process for the plain text message
is illustrated in the below steps:
1: Read theencryptedplain text message (.txt) file.
2: Calculate the plain text length (L=38), which is equal to ((Recived text length)/2) = (38/2) =19
4: Initialize character pair index (i=0)
5: Initialize the Crossoverpoint (Crossoverpoint=1)
3: Initialize Mutation point (Mutation point =1)
7: Input the characters pair (Parent1(i), Parent2(i))
8: Gettheunicodefor each character.
9: Convert the unicode values into its equivalent binary form of (8-bit) length
10: Do mutation operation of index (i) between (Parent1 (i) & Parent2(i)).
11: The Mutation operation result is (Child1(i) &Child2(i))
12: Do single point Crossover operation of index (i) between (Child1(i) &Child2(i))
13: Plain textcharacter of index (i) is produced
14: Increment the variable (i) by one (i=i+1)
15: If (i>19) Then Plain text is completed Else
(Crossover point= Crossoverpoint+1); Mutation point=Mutation point+1)
16: Crossover point= Crossoverpoint+1; Mutation point=Mutation point+1
17: If Crossover point& Mutation point> 8 Then (Crossoverpoint =1; Mutation point=1)
18: DoSteps (7-18)
Figure 4. Program run results
Int J Elec & Comp Eng ISSN: 2088-8708 
Features of genetic algorithm for plain text encryption (Riyadh Bassil Abduljabbar)
439
3.3. Execution time
Generally, the standard cipher AES, DES and RSA are more scure. On the other hand, have high
computional cost to very large data files encryption [26]. In this approach, the compution time analysis has
been performed for five different data file size as shown in Table 1. From Table 1 and Figure 5 it can be
shown that the results of the proposal outperformed the RAS and DES in the execution time term.
Undoubtedly, the computional cost proportional inverse with file size.
Table 1. Comparison between the proposed work and other traditional encryption algorithms
Data Encryption Standard RSA Algorithm
Text Pair Genetic
(Proposed Work)
Text Size (Kilobyte)
2.553 sec 5.6373 sec 1.636 sec 10 KB
6.865 sec 11.274 sec 5.980 sec 20 KB
11.652 sec 16.912 sec 9.175 sec 30 KB
15.175 sec 22.549 sec 13.361 sec 40 KB
19.719 sec 28.186 sec 16.557 sec 50 KB
Figure 5. Encryption time of the approach, [RSA] and [DES] algorithms
3.4. Throughput
The calculation of Throughput is preformed by dividing the sum of the input files sizes to the time
consumed by the encryption process as illustrated in (1). The comparison results between GA, DES and
RSA is shown in Tables 2 and 3. As shown in previous tables, the GA achieved reasonable throughput
compared with DES and RSA. Throughput (Kilobyte/Second) = SUM. (Input text file size)/SUM.
(Encryption execution time)
Table 2. Comparison of encryption throughput of the proposed work [GA] and DES, RSA algorithms
Encryption Algorithm
File Size
(KB)
Encryption Throughput
(KB/Sec.)
Proposed work [GA] 225KB 4.0229
DES [6] 225KB 3.3011
RSA [6] 225KB 2.6608
Table 3. Comparison of encryption throughput of the proposed work [GA] and DES, RSA algorithms
Text File Size
(Kilobyte)
100KB Algorithm Throughput (Kilobyte/Second)
100KB RSA 1.228 Seconds
100KB Data Encryption Standard 1.963 Seconds
0 5 10 15 20 25 30
10
15
20
25
30
35
40
45
50
Text Size (Kilobyte)
Execution
Time
(Second)
Data Encryption Standard
RSA Algorithm
Genetic (TextPair)
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 1, February 2021 : 434 - 441
440
4. CONCLUSION
In this paper, encryption approach for ciphering Arabic text using genetic algorithm operators has
been proposed. This approach is Simple and easy to implement in cryptographic system because it depends
on two basic operations the crossover and mutation. In this proposal, Genetic operator algorithms, encryption
and decryption processes are achieved in acceptable security level in both transmission and receiving end,
due to the use of crossover and mutation operations in which binary and decimal conversions increase
the strength of encryption approach. On other hand, the computational time of this approach is relatively high
compared with other traditional cryptography schems like DES and RSA algorithms. Numerous expansions
of the suggestion could be projected in the upcoming time like enhancing the security level of encryption by
using chaotic logistic map. Secondly, implement it for multimedia encryption.
REFERENCES
[1] C. S. Cherian and Rasmi P. S., “Genetic Algorithm and Random number Generation for Symmetric Encryption,”
International Journal of New Innovations in Engineering and Technology, vol. 10, no. 2, pp. 1-5, 2019.
[2] A. Kumar and K. Chatterjee, “An efficient stream cipher using genetic algorithm,” in International Conference on
Wireless Communications, Signal Processing and Networking, pp. 2322-2326, 2016.
[3] Ragavan M. and K. Prabu, “Dynamic Key generation for Cryptographic Process using Genetic Algorithm,”
International Journal of Computer Science and Information Security (IJCSIS), vol. 17, no. 4, pp. 246-250, 2019.
[4] B. Maram, et al., “Intelligent security algorithm for UNICODE data privacy and security in IOT,” Service Oriented
Computing and Applications, pp. 1-13, 2018.
[5] P. A. N. Agbedemnab, et al., “A Novel Text Encryption and Decryption Scheme using the Genetic Algorithm and
Residual Numbers,” in K. Njenga (ed), Proceedings of 4th International Conference on the Internet, Cyber Security
and Information System, vol. 12, pp. 20-31, 2019.
[6] H. M. Mousa, “Bat-Genetic Encryption Technique,” International Journal of Intelligent Systems and Applications,
vol 11, pp. 1-15, 2019.
[7] H. N. Hussain and W. N. Hussein, “Implementation of Symmetric Encryption Algorithms,” Computer Engineering
and Intelligent Systems, vol. 8, no. 4, pp. 13-18, 2017.
[8] K. K. Mandal, et al., “Applying Encryption Algorithm on Text Steganography Based on Number System,”
in Computational Advancement in Communication Circuits and Systems, pp. 255-266, 2020.
[9] O. K. Hamid, “Arabic Text Encryption Using Artificial Neural Networks,” Engineering and Technology Journal,
vol. 34, no. 5, pp. 887-899, 2016.
[10] K. Alla, et al., “A Novel Encryption Using Genetic Algorithms and Quantum Computing with Roulette Wheel
Algorithm for Secret Key Generation,” in ICT Analysis and Applications, pp. 263-271, 2020.
[11] J. Rodriguez, et al., “Genetic Operators Applied to Symmetric Cryptography,” International Journal of Interactive
Multimedia & Artificial Intelligence, vol. 5, no. 7, pp. 39-49, 2019.
[12] M. Krajcovic, et al., “Parameter setting for a genetic algorithm layout planner as a toll of sustainable
manufacturing,” Sustainability, vol. 11, no. 7, 2019.
[13] R. Jhingran, et al., “A study on cryptography using genetic algorithm,” International Journal of Computer
Applications, vol. 118, no. 20, pp. 10-14, 2015.
[14] S. Mishra and S. Bali, “Public key cryptography using genetic algorithm,” International Journal of Recent
Technology and Engineering, vol. 2, no. 2, pp. 150-154, 2013.
[15] Sindhuja K. and Pramela D. S., “A symmetric key encryption technique using genetic algorithm,” International
journal of computer science and information technologies, vol. 5, no. 1, pp. 414-416, 2014.
[16] P. Srikanth, et al., “Encryption and Decryption Using Genetic Algorithm Operations and Pseudorandom Number,”
IJCSN-International Journal of Computer Science and Network, vol. 6, no. 3, pp. 455-459, 2017.
[17] M. I. Nazeer, et al., “Implication of Genetic Algorithm in Cryptography to Enhance Security,” International
Journal of Advanced Computer Science and Applications, vol. 9, no. 6, pp. 375-379, 2018.
[18] A. M. Abdallah and M. M. Ibrahim, “Text Encryption Using Genetic Algorithm,” IJCSN - International Journal of
Computer Science and Network, vol. 8, no. 1, pp. 36-39, 2019.
[19] Alam M. S., et al., “An improved fitness function for automated cryptanalysis using genetic algorithm,” Indonesian
Journal of Electrical Engineering and Computer Science (IJEECS), vol. 13, no. 2, pp. 643-648, 2019.
[20] A. Z. Zakaria, “Enhancing the Randomness of Symmetric Key using Genetic Algorithm,” International Journal of
Innovative Technology and Exploring Engineering (IJITEE), vol. 8, no. 8S, pp. 327-330, 2019.
[21] K. Anitha and T. G. Nair, “Data storage lock algorithm with cryptographic techniques,” International Journal of
Electrical and Computer Engineering (IJECE), vol. 9, no. 5, pp. 3843-3849, 2019.
[22] R. Bhandari and Kirubanand V. B., “Enhanced encryption technique for secure iot data transmission,” International
Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 5, pp. 3732-3738, 2019.
[23] N. Tahat, et al., “A new RSA public key encryption scheme with chaotic maps,” International Journal of Electrical
and Computer Engineering (IJECE), vol. 10, no. 2, pp. 1430-1437, 2020.
[24] Jyothi R. and N. G. Cholli, “An efficient approach for secured communication in wireless sensor networks,”
International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 2, pp. 1641-1647, 2020.
[25] O. K. Riyadh, et al., “Fast and robust approach for data security in communication channel using pascal matrix,”
Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 19, no. 1, pp. 248-256, 2020.
Int J Elec & Comp Eng ISSN: 2088-8708 
Features of genetic algorithm for plain text encryption (Riyadh Bassil Abduljabbar)
441
[26] N. Al-Hayani, et al., “Simultaneous video compression and encryption for real-time secure transmission,” 2013 8th
International Symposium on Image and Signal Processing and Analysis, pp. 240-245, 2013.
BIOGRAPHIES OF AUTHORS
Riyadh Bassil Abduljabbar received his Bsc. Eng. and M.D. Eng. in Computer and Control
Engineering from University of Baghdad Iraq in 2000 and 2003 respectivelt. Currently, he is a
senior lecturer in the Faculty of Computer Engineering Techniques at Dijlah University College
Iraq (DUC). His research interests include Data Security, Networking, Cluod Security, Computer
Architecture.
Oday Kamil Hamid received his Bsc. in Electrical Engineering and M.D. Eng in
Communication Engineering from University of Technology Iraq in 2000 and 2003 respectively.
Currently, he is a senior lecturer in the Faculty of Computer Engineering Techniques at Dijlah
University College Iraq (DUC). His research interest, communication, security, digital signal
processing, speech recognition, neural network.
Nazar Jabbar Alhyani received his PhD of Science in Electronic Engineering from University
of Buckingham - UK in 2015. Currently, he is a university staff at Dijlah University College Iraq
(DUC). His research interests include secure transmission, video encryption and compression,
cloud security and data encryption.

More Related Content

PDF
Design and Implementation of New Encryption algorithm to Enhance Performance...
PDF
Block cipher encryption for text to-image algorithm
PDF
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
PDF
A new hybrid text encryption approach over mobile ad hoc network
PDF
Public key cryptography
PDF
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
PDF
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
PDF
Secure data transmission by using steganography
Design and Implementation of New Encryption algorithm to Enhance Performance...
Block cipher encryption for text to-image algorithm
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
A new hybrid text encryption approach over mobile ad hoc network
Public key cryptography
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
Secure data transmission by using steganography

What's hot (19)

PDF
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
PDF
11.secure data transmission by using steganography
PDF
IRJET - Hash Functions and its Security for Snags
PDF
Two level data security using steganography and 2 d cellular automata
PDF
An Enhanced Message Digest Hash Algorithm for Information Security
PDF
A Hybrid Approach for Ensuring Security in Data Communication
PDF
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
PDF
ijrrest_vol-2_issue-2_015
PDF
Text in Image Hiding using Developed LSB and Random Method
PDF
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
PDF
Ijcnc050208
PDF
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
PDF
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
PDF
Double layered dna based cryptography
PDF
H42054550
PDF
Security analysis of fbdk block cipher for digital images
PDF
Data Hiding Using Green Channel as Pixel Value Indicator
PDF
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
PDF
Image Cryptography using RSA Algorithm
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
11.secure data transmission by using steganography
IRJET - Hash Functions and its Security for Snags
Two level data security using steganography and 2 d cellular automata
An Enhanced Message Digest Hash Algorithm for Information Security
A Hybrid Approach for Ensuring Security in Data Communication
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
ijrrest_vol-2_issue-2_015
Text in Image Hiding using Developed LSB and Random Method
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Ijcnc050208
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Double layered dna based cryptography
H42054550
Security analysis of fbdk block cipher for digital images
Data Hiding Using Green Channel as Pixel Value Indicator
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
Image Cryptography using RSA Algorithm
Ad

Similar to Features of genetic algorithm for plain text encryption (20)

PDF
Dual method cryptography image by two force secure and steganography secret m...
PDF
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...
PDF
Improved Image Encryption for Real-Time Application over Wireless Communicati...
PDF
A novel efficient multiple encryption algorithm for real time images
PDF
User Selective Encryption Method for Securing MANETs
PDF
New Technique Using Multiple Symmetric keys for Multilevel Encryption
PDF
Fog and Internet of Things Network Security through Blowfish Cipher
PDF
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
PDF
Efficient two-stage cryptography scheme for secure distributed data storage i...
PDF
Advanced approach for encryption using advanced encryption standard with chao...
PDF
Analysis of a hybrid cipher algorithm
PDF
ASCII Value Based Encryption System (AVB)
PDF
Hybrid information security system via combination of compression, cryptogra...
PDF
18. 23367.pdf
PDF
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
PDF
Review paper on Data Security using Cryptography and Steganography
PDF
Parc4 i parallel implementation of
PDF
A novel image encryption scheme based on DCT transform and DNA sequence
PDF
5. article azojete vol 11 50 61 mala
PDF
A comparative review on symmetric and asymmetric DNA-based cryptography
Dual method cryptography image by two force secure and steganography secret m...
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...
Improved Image Encryption for Real-Time Application over Wireless Communicati...
A novel efficient multiple encryption algorithm for real time images
User Selective Encryption Method for Securing MANETs
New Technique Using Multiple Symmetric keys for Multilevel Encryption
Fog and Internet of Things Network Security through Blowfish Cipher
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
Efficient two-stage cryptography scheme for secure distributed data storage i...
Advanced approach for encryption using advanced encryption standard with chao...
Analysis of a hybrid cipher algorithm
ASCII Value Based Encryption System (AVB)
Hybrid information security system via combination of compression, cryptogra...
18. 23367.pdf
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
Review paper on Data Security using Cryptography and Steganography
Parc4 i parallel implementation of
A novel image encryption scheme based on DCT transform and DNA sequence
5. article azojete vol 11 50 61 mala
A comparative review on symmetric and asymmetric DNA-based cryptography
Ad

More from IJECEIAES (20)

PDF
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
PDF
Embedded machine learning-based road conditions and driving behavior monitoring
PDF
Advanced control scheme of doubly fed induction generator for wind turbine us...
PDF
Neural network optimizer of proportional-integral-differential controller par...
PDF
An improved modulation technique suitable for a three level flying capacitor ...
PDF
A review on features and methods of potential fishing zone
PDF
Electrical signal interference minimization using appropriate core material f...
PDF
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
PDF
Bibliometric analysis highlighting the role of women in addressing climate ch...
PDF
Voltage and frequency control of microgrid in presence of micro-turbine inter...
PDF
Enhancing battery system identification: nonlinear autoregressive modeling fo...
PDF
Smart grid deployment: from a bibliometric analysis to a survey
PDF
Use of analytical hierarchy process for selecting and prioritizing islanding ...
PDF
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
PDF
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
PDF
Adaptive synchronous sliding control for a robot manipulator based on neural ...
PDF
Remote field-programmable gate array laboratory for signal acquisition and de...
PDF
Detecting and resolving feature envy through automated machine learning and m...
PDF
Smart monitoring technique for solar cell systems using internet of things ba...
PDF
An efficient security framework for intrusion detection and prevention in int...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Embedded machine learning-based road conditions and driving behavior monitoring
Advanced control scheme of doubly fed induction generator for wind turbine us...
Neural network optimizer of proportional-integral-differential controller par...
An improved modulation technique suitable for a three level flying capacitor ...
A review on features and methods of potential fishing zone
Electrical signal interference minimization using appropriate core material f...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Bibliometric analysis highlighting the role of women in addressing climate ch...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Smart grid deployment: from a bibliometric analysis to a survey
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Remote field-programmable gate array laboratory for signal acquisition and de...
Detecting and resolving feature envy through automated machine learning and m...
Smart monitoring technique for solar cell systems using internet of things ba...
An efficient security framework for intrusion detection and prevention in int...

Recently uploaded (20)

PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPT
introduction to datamining and warehousing
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Sustainable Sites - Green Building Construction
PDF
composite construction of structures.pdf
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
web development for engineering and engineering
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
introduction to datamining and warehousing
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Model Code of Practice - Construction Work - 21102022 .pdf
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
bas. eng. economics group 4 presentation 1.pptx
UNIT 4 Total Quality Management .pptx
Sustainable Sites - Green Building Construction
composite construction of structures.pdf
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Foundation to blockchain - A guide to Blockchain Tech
web development for engineering and engineering
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk

Features of genetic algorithm for plain text encryption

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 11, No. 1, February 2021, pp. 434~441 ISSN: 2088-8708, DOI: 10.11591/ijece.v11i1.pp434-441  434 Journal homepage: http://ijece.iaescore.com Features of genetic algorithm for plain text encryption Riyadh Bassil Abduljabbar, Oday Kamil Hamid, Nazar Jabbar Alhyani Department of Computer Techniques Engineering, Dijlah University College, Iraq Article Info ABSTRACT Article history: Received Apr 24, 2020 Revised Jun 15, 2020 Accepted Aug 5, 2020 The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed processing. Keywords: Crossover Genetic algorithm Mutation Plain text Text encryption This is an open access article under the CC BY-SA license. Corresponding Author: Riyadh Bassil Abduljabbar, Department of Computer Engineering Techniques, Dijlah University College, Baghdad, Iraq. Email: riyadh.bassil@duc.edu.iq 1. INTRODUCTION Cryptography field has been attracted a lot of concern especially in network security. Internet popularity and its usage increases due and to the exponential increase in the security needs for the transactions ine-commerce field [1]. In addition to risks which involved regarding the communication of raw data via the Internet. High and importance gain could be provided by data integrity, non-repudiation, confidentiality, and authenticity which become more important component in the security of information [2, 3]. The best solution for keeping safe data transfer is the use of cryptography as a technique for encrypting and decrypting messages soany body can not interpret it, only the message sender and the receiver can. Consequently, data encryption has become an inevitable and integral part of any application in e-commerce [4-6]. Therefore, it is very important to encrypt data using a robust and fast encryption algorithm in order to make sure of secret transmission and data delivery to protect it from any intruder. In general, the concept of encryption techniques is converting the plain text to cipher text before storage or transmission [7-10]. The Genetic algorithm properties (mutation, crossover and selection) have been exploited by many researchers for data encryption optimizing and searching problems through generating typical solutions [11, 12]. This paper introduces new method for data encryption based on the Genetic algorithm operators (Crossover and mutation) with a varying crossover and mutation points of indexs between character pairs. The outline of this paper is ordered: Section 1 focoused on the work review. The suggested technique is described in section 2. The experimental results and encryption analysis are highlight in section 3. Finally, conclusion is showed in section 4. In Cryptography, many researches have been done to enhance the genetic algorithm. Jhingran and Vikas [13] presented Studies on cryptography techniques using
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708  Features of genetic algorithm for plain text encryption (Riyadh Bassil Abduljabbar) 435 genetic algorithm. In which, cryptography system is proposed by utilized thegenetic algorithm and public key. In 2014, Sindhuja and Pramela [14, 15] introduced a symmetric key for message encryption and decryption. The length of secret key is concerned with number point of both crossover and mutation processing. Srikanth and Noha proposed mutation and crossover operations of genetic algorithm with pseudorandom function for data encryption [16]. To increase the robustness of the secret key, Nazeer and Ghulamo, suggests genetic algorithm with random number generator to introduce a secret key. The raw data is diffused by crossover and mutation. Finally, the diffused data and key are undergoing to logical operations [17]. In 2019, Alsadig and Mandour [18] have proposed a text encryption using genetic algorithm. The secret key is generated by exploit the crossover and mutation. Then, the permutation factor generated randomly. Subsequently, the secret key and the permutation factor are applied to the plain text. Shafiul and Sabir also proposed genetic algorithm combined with fitness function for text encryption, in which the crossover and mutation operations are combined with a random function generator for best key generation [19]. Afigha and Sofia [20] suggested security improvement to randomness of security key unexpected based on crossover and mutation features of genetic algorithm. The results show that the generated secret key is most randomness and unpredictable by the intruder. In order to protect and secured data in cloud computing, Amitha and T.R suggested algorithm called DSLA, in which a private key is used to investigate the user reliability [21]. The IOT (Internet of Thing) is a device useful for communicate and exchange information between computerize schemes. Rubesh and kirybanand presented a proposal to increase the security level between IOT and clients by integrate the public key, asymmetric and symmetric cryptography system [22]. In 2020, Nedal.and Ashraf, introduced a combine chaotic map with RSA algorithm to improve security level of RSA key. The results show that the security level of new approach is enhanced compared with RAS public key standalone and reduced the computational processing time [23]. The main security of WSN established on key distribution between nodes. Jyothi and Nagarai defines a new method for key distribution within WSN based on ECC. The proposal reshuffling the ECC public key by utilized Arnold map. The result show that the suggestion can be applied on poor recourse communication system [24]. Several ciphers have been developed to text encryption. Oday and nazar in 2019, described cipher algorithm for text encryption. The encryption implements Pascal matrix and inverse Pascal matrix preformed for decryption processing [25]. 2. RESEARCH METHOD The proposed algorithm is divided into two main processes, the encryption process and the decryption process each onedepends on genetic operators to implement the encryption and decryptionwith the aid of character pairs technique. 2.1. Encryption process As shown in Figure 1, encryption process can be characterized starting from reading the plain text message, converting the text characters into binary form after taking its equivalent Unicodevalues. The first generation is produced when crossover operation is implemented between the binary pairs (crossover index (1) is used for the first pair (1) for the second pair (3) for the third pair till (8) for the eighth pair and the cross over is restarted to (1) for the nineth pair and so on. Mutation point is applied to the resulted generation (mutation index (1) is used for the first pair (1) for the second pair (3) for the third pair till (8) for the eighth pair and the cross over is restarted to (1) for the nineth pair and so on. Ciphered text is produced after getting the equivalent characters according to ASCII table. The methodology of the encryption process is illustrated in Figure 1. 2.2. Decryption process The decryption method is shown in Figure 2, and described as follows, at the receiver part the receiver will receive the encrypted text that consists of two parts the first part is (Parent1) and the second part is (Parent2). Both (Parent1) and (Parent2) characters are converted to its equivalentuincodevaluesand then to their equivalent binary form of byte length. Mutation operation is implemented on (Parent1) and (Parent2)(mutation index (1) is used for the first pair (1) for the second pair (3) for the third pair till (8) for the eighth pair and the cross over is restarted to (1) for the nineth pair and so onthe result is (Child1 & Child2). Crossover operation is donebetweenthe (Child1) and (Child2)(crossover index (1) is used for the first pair (1) for the second pair (3) for the third pair till (8) for the eighth pair and the cross over is restarted to (1) for the nineth pair and so onto get theoriginalplain text. The methodology of the decryption process is illustrated in Figure 2.
  • 3.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 1, February 2021 : 434 - 441 436 Figure 1. Flow chart of the encryption process Figure 2. Flow chart of thedecryption process 3. RESULTS AND DISCUSSIONS All the expermints have been preformed in MATLAB version 10 and achivied on Intel core i5 processor (2.4) GHz and RAM (8) GB. 3.1. Encrypting an English text message The proposal encryption structure as shown in Figure 3 and defined as follows:
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708  Features of genetic algorithm for plain text encryption (Riyadh Bassil Abduljabbar) 437 At first the English plain text message to be encrypted using the proposed technique is read by using (text read) Matlab instruction. The plain textthatenterd to the program is "Very secret message" so the plain text message contains (19) characters. The encryption process for the plain text message is illustrated in the below steps: 1: Read the plain text message that is saved in a (.txt) file. 2: Calculate the length of the plain text (L=19) 3: Initialize character pair index (i=1) 4: Mutation point = 1; Crossoverpoint=1 5: If i=L then input (ChL& Ch1) Else input (Chi & Chi+1) 6: Gettheunicodefor each character. 7: Convert the unicodevaluesinto its equivalent binary form of (8-bit) length 8: Do single point Crossover operation of index (i) betweenthe pairs of indexs (i& i+1) 9: Mutate the result (Child1(i)) & (Child2(i)) using Mutation point index (i) 10: Get the (char) of the Mutation operation result 11: Ciphered character of index (i) is produced 12: Increment the variable (i) by one (i=i+1) 13: If (i>19) Then Ciphered text is completedElse (Crossover point= Crossoverpoint+1); Mutation point = Mutation Point+1 14: If Crossover point& Mutation point> 8 Then (Crossoverpoint =1; Mutationpoint =1) 15: Check If i=19Then input the characters pair of indexes of (19&1) hence (Ch19, Ch1) DoSteps (6-14) Else Do Steps (6-15) The result is the encrypted text which is “dp}x3Q%ٍdvd%}G3‫ل‬fgR” is sent along with (Child2). The result which is “Wgv!`G#‫م‬sg0huQ3ٍ`ea” after running the Matlab program are illustrated in the Figure 3. Figure 3. Program run results
  • 5.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 1, February 2021 : 434 - 441 438 3.2. Decrypting an English text message The decryption steps and the results are summarized in Figure 4, and demonstrated as follows: At the receiver end the receiver will receive the encrypted text“dp}x3Q%ٍdvd%}G3‫ل‬fgr” which is considered as (Parent1) along with “Wgv!`G#‫م‬sg0huQ3ٍ`eA”which is considered as (Parent2) this encrypted text message is read by using (text read) Matlabinstruction. The encryption process for the plain text message is illustrated in the below steps: 1: Read theencryptedplain text message (.txt) file. 2: Calculate the plain text length (L=38), which is equal to ((Recived text length)/2) = (38/2) =19 4: Initialize character pair index (i=0) 5: Initialize the Crossoverpoint (Crossoverpoint=1) 3: Initialize Mutation point (Mutation point =1) 7: Input the characters pair (Parent1(i), Parent2(i)) 8: Gettheunicodefor each character. 9: Convert the unicode values into its equivalent binary form of (8-bit) length 10: Do mutation operation of index (i) between (Parent1 (i) & Parent2(i)). 11: The Mutation operation result is (Child1(i) &Child2(i)) 12: Do single point Crossover operation of index (i) between (Child1(i) &Child2(i)) 13: Plain textcharacter of index (i) is produced 14: Increment the variable (i) by one (i=i+1) 15: If (i>19) Then Plain text is completed Else (Crossover point= Crossoverpoint+1); Mutation point=Mutation point+1) 16: Crossover point= Crossoverpoint+1; Mutation point=Mutation point+1 17: If Crossover point& Mutation point> 8 Then (Crossoverpoint =1; Mutation point=1) 18: DoSteps (7-18) Figure 4. Program run results
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708  Features of genetic algorithm for plain text encryption (Riyadh Bassil Abduljabbar) 439 3.3. Execution time Generally, the standard cipher AES, DES and RSA are more scure. On the other hand, have high computional cost to very large data files encryption [26]. In this approach, the compution time analysis has been performed for five different data file size as shown in Table 1. From Table 1 and Figure 5 it can be shown that the results of the proposal outperformed the RAS and DES in the execution time term. Undoubtedly, the computional cost proportional inverse with file size. Table 1. Comparison between the proposed work and other traditional encryption algorithms Data Encryption Standard RSA Algorithm Text Pair Genetic (Proposed Work) Text Size (Kilobyte) 2.553 sec 5.6373 sec 1.636 sec 10 KB 6.865 sec 11.274 sec 5.980 sec 20 KB 11.652 sec 16.912 sec 9.175 sec 30 KB 15.175 sec 22.549 sec 13.361 sec 40 KB 19.719 sec 28.186 sec 16.557 sec 50 KB Figure 5. Encryption time of the approach, [RSA] and [DES] algorithms 3.4. Throughput The calculation of Throughput is preformed by dividing the sum of the input files sizes to the time consumed by the encryption process as illustrated in (1). The comparison results between GA, DES and RSA is shown in Tables 2 and 3. As shown in previous tables, the GA achieved reasonable throughput compared with DES and RSA. Throughput (Kilobyte/Second) = SUM. (Input text file size)/SUM. (Encryption execution time) Table 2. Comparison of encryption throughput of the proposed work [GA] and DES, RSA algorithms Encryption Algorithm File Size (KB) Encryption Throughput (KB/Sec.) Proposed work [GA] 225KB 4.0229 DES [6] 225KB 3.3011 RSA [6] 225KB 2.6608 Table 3. Comparison of encryption throughput of the proposed work [GA] and DES, RSA algorithms Text File Size (Kilobyte) 100KB Algorithm Throughput (Kilobyte/Second) 100KB RSA 1.228 Seconds 100KB Data Encryption Standard 1.963 Seconds 0 5 10 15 20 25 30 10 15 20 25 30 35 40 45 50 Text Size (Kilobyte) Execution Time (Second) Data Encryption Standard RSA Algorithm Genetic (TextPair)
  • 7.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 1, February 2021 : 434 - 441 440 4. CONCLUSION In this paper, encryption approach for ciphering Arabic text using genetic algorithm operators has been proposed. This approach is Simple and easy to implement in cryptographic system because it depends on two basic operations the crossover and mutation. In this proposal, Genetic operator algorithms, encryption and decryption processes are achieved in acceptable security level in both transmission and receiving end, due to the use of crossover and mutation operations in which binary and decimal conversions increase the strength of encryption approach. On other hand, the computational time of this approach is relatively high compared with other traditional cryptography schems like DES and RSA algorithms. Numerous expansions of the suggestion could be projected in the upcoming time like enhancing the security level of encryption by using chaotic logistic map. Secondly, implement it for multimedia encryption. REFERENCES [1] C. S. Cherian and Rasmi P. S., “Genetic Algorithm and Random number Generation for Symmetric Encryption,” International Journal of New Innovations in Engineering and Technology, vol. 10, no. 2, pp. 1-5, 2019. [2] A. Kumar and K. Chatterjee, “An efficient stream cipher using genetic algorithm,” in International Conference on Wireless Communications, Signal Processing and Networking, pp. 2322-2326, 2016. [3] Ragavan M. and K. Prabu, “Dynamic Key generation for Cryptographic Process using Genetic Algorithm,” International Journal of Computer Science and Information Security (IJCSIS), vol. 17, no. 4, pp. 246-250, 2019. [4] B. Maram, et al., “Intelligent security algorithm for UNICODE data privacy and security in IOT,” Service Oriented Computing and Applications, pp. 1-13, 2018. [5] P. A. N. Agbedemnab, et al., “A Novel Text Encryption and Decryption Scheme using the Genetic Algorithm and Residual Numbers,” in K. Njenga (ed), Proceedings of 4th International Conference on the Internet, Cyber Security and Information System, vol. 12, pp. 20-31, 2019. [6] H. M. Mousa, “Bat-Genetic Encryption Technique,” International Journal of Intelligent Systems and Applications, vol 11, pp. 1-15, 2019. [7] H. N. Hussain and W. N. Hussein, “Implementation of Symmetric Encryption Algorithms,” Computer Engineering and Intelligent Systems, vol. 8, no. 4, pp. 13-18, 2017. [8] K. K. Mandal, et al., “Applying Encryption Algorithm on Text Steganography Based on Number System,” in Computational Advancement in Communication Circuits and Systems, pp. 255-266, 2020. [9] O. K. Hamid, “Arabic Text Encryption Using Artificial Neural Networks,” Engineering and Technology Journal, vol. 34, no. 5, pp. 887-899, 2016. [10] K. Alla, et al., “A Novel Encryption Using Genetic Algorithms and Quantum Computing with Roulette Wheel Algorithm for Secret Key Generation,” in ICT Analysis and Applications, pp. 263-271, 2020. [11] J. Rodriguez, et al., “Genetic Operators Applied to Symmetric Cryptography,” International Journal of Interactive Multimedia & Artificial Intelligence, vol. 5, no. 7, pp. 39-49, 2019. [12] M. Krajcovic, et al., “Parameter setting for a genetic algorithm layout planner as a toll of sustainable manufacturing,” Sustainability, vol. 11, no. 7, 2019. [13] R. Jhingran, et al., “A study on cryptography using genetic algorithm,” International Journal of Computer Applications, vol. 118, no. 20, pp. 10-14, 2015. [14] S. Mishra and S. Bali, “Public key cryptography using genetic algorithm,” International Journal of Recent Technology and Engineering, vol. 2, no. 2, pp. 150-154, 2013. [15] Sindhuja K. and Pramela D. S., “A symmetric key encryption technique using genetic algorithm,” International journal of computer science and information technologies, vol. 5, no. 1, pp. 414-416, 2014. [16] P. Srikanth, et al., “Encryption and Decryption Using Genetic Algorithm Operations and Pseudorandom Number,” IJCSN-International Journal of Computer Science and Network, vol. 6, no. 3, pp. 455-459, 2017. [17] M. I. Nazeer, et al., “Implication of Genetic Algorithm in Cryptography to Enhance Security,” International Journal of Advanced Computer Science and Applications, vol. 9, no. 6, pp. 375-379, 2018. [18] A. M. Abdallah and M. M. Ibrahim, “Text Encryption Using Genetic Algorithm,” IJCSN - International Journal of Computer Science and Network, vol. 8, no. 1, pp. 36-39, 2019. [19] Alam M. S., et al., “An improved fitness function for automated cryptanalysis using genetic algorithm,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 13, no. 2, pp. 643-648, 2019. [20] A. Z. Zakaria, “Enhancing the Randomness of Symmetric Key using Genetic Algorithm,” International Journal of Innovative Technology and Exploring Engineering (IJITEE), vol. 8, no. 8S, pp. 327-330, 2019. [21] K. Anitha and T. G. Nair, “Data storage lock algorithm with cryptographic techniques,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 5, pp. 3843-3849, 2019. [22] R. Bhandari and Kirubanand V. B., “Enhanced encryption technique for secure iot data transmission,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 5, pp. 3732-3738, 2019. [23] N. Tahat, et al., “A new RSA public key encryption scheme with chaotic maps,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 2, pp. 1430-1437, 2020. [24] Jyothi R. and N. G. Cholli, “An efficient approach for secured communication in wireless sensor networks,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 2, pp. 1641-1647, 2020. [25] O. K. Riyadh, et al., “Fast and robust approach for data security in communication channel using pascal matrix,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 19, no. 1, pp. 248-256, 2020.
  • 8. Int J Elec & Comp Eng ISSN: 2088-8708  Features of genetic algorithm for plain text encryption (Riyadh Bassil Abduljabbar) 441 [26] N. Al-Hayani, et al., “Simultaneous video compression and encryption for real-time secure transmission,” 2013 8th International Symposium on Image and Signal Processing and Analysis, pp. 240-245, 2013. BIOGRAPHIES OF AUTHORS Riyadh Bassil Abduljabbar received his Bsc. Eng. and M.D. Eng. in Computer and Control Engineering from University of Baghdad Iraq in 2000 and 2003 respectivelt. Currently, he is a senior lecturer in the Faculty of Computer Engineering Techniques at Dijlah University College Iraq (DUC). His research interests include Data Security, Networking, Cluod Security, Computer Architecture. Oday Kamil Hamid received his Bsc. in Electrical Engineering and M.D. Eng in Communication Engineering from University of Technology Iraq in 2000 and 2003 respectively. Currently, he is a senior lecturer in the Faculty of Computer Engineering Techniques at Dijlah University College Iraq (DUC). His research interest, communication, security, digital signal processing, speech recognition, neural network. Nazar Jabbar Alhyani received his PhD of Science in Electronic Engineering from University of Buckingham - UK in 2015. Currently, he is a university staff at Dijlah University College Iraq (DUC). His research interests include secure transmission, video encryption and compression, cloud security and data encryption.